Sciweavers

5476 search results - page 10 / 1096
» Resettably Secure Computation
Sort
View
39
Voted
TJS
2011
29views more  TJS 2011»
14 years 10 months ago
Secure mobile communication via identity-based cryptography and server-aided computations
Matthew Smith, Christian Schridde, Björn Agel...
129
Voted
JDCTA
2010
172views more  JDCTA 2010»
14 years 10 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
JNCA
2010
85views more  JNCA 2010»
14 years 10 months ago
Adaptive security protocol selection for mobile computing
Bruno P. S. Rocha, Daniel N. O. Costa, Rande A. Mo...
116
Voted
CORR
2011
Springer
331views Education» more  CORR 2011»
14 years 7 months ago
An Overview of the Security Concerns in Enterprise Cloud Computing
Anthony Bisong, Syed M. Rahman